Featured Blog
Securing the Email Flow: Implementing Encrypted Email in Microsoft 365, Exchange, and Onward
Most information security and IT teams know the risks involved when sending unencrypted email. However, outside of those groups, it is still not clear to many email users why encrypting sensitive email messages is so important and the extent of risks associated with unencrypted email communications. Encrypted email adoption still remains low across many industries. […]
BCDR, Cybersecurity, Vendor Risk Management
How Cybersecurity Impacts Business Continuity Planning and Disaster Recovery
Cybersecurity, Security contols
Criminals Take Cyberattacks to the Next Level: Recent Cybersecurity Attacks & Tactics Explained
Business email compromise, Cyberattacks
How to Prevent Business Email Compromise & What To Do If You Get Hacked
BYOD, Phishing, Text Phishing